Support online session content auditing and historical session content auditing Support user operation behavior auditing Support for auditing the logs of users logging into the JumpServer system and collecting the audit information to Syslog Open source access control password#Support unified operations of checking, updating and testing the user password of the host Support regular discovering of host status by customizing Support unified automated asset management of private cloud and public cloud Support regular password changing by batch Linux/Windows Generate random-password Implement multiple password strategies Support asset password managed service Automatic generation of password Automatic push of password Password expiration setting Support 5 roles including super administrator, super auditor, organizational administrator (X-Pack), organizational auditor (X-Pack) and normal user Support management of management user and system user Support multi-tenant management and privilege isolation Support SFTP file upload/download and Web SFTP file management Ĭontrol user’s login requests, and support applications of ticket for authorization It can control the commands executed by authorized system users Authorized system users’ command execution is under control. Support privileged instructions and black and whitelist The available (or accessible) time of authorized resources is supervised and controlled Control the permission of clipboard copy/paste (from outer terminal to current asset) (only Windows assets) Open source access control download#Support users to connect Kubernetes clusters through JumpServer Įnable Windows system to be more fine-grained authorization, and audit recordings of application operation through playback ĭeeper restriction on the control of file upload, download and connection actions of authorized assets. Support finer-grained application authorization Support database authorization including MySQL, Oracle Database(X-Pack), PostgreSQL (X-Pack) and MariaDB (X-Pack) Users, user groups, assets, nodes of assets, applications and system users can be authorized ĭisplayed in a tree structure, assets and nodes of the asset tree can be flexibly authorized Assets in nodes can inherit the authorization automatically Child nodes automatically inherit the authorization from parent nodes MFA with Google Authenticator, RADIUS authentication, etc Īny user’s login behavior is supervised and controlled by the administrator Unified Login and Authentication for resource LDAP/AD authentication RADIUS authentication Single Sign-on (OpenID authentication, CAS authentication) SSO intergration
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |